Narrow your search

Library

KU Leuven (19)

ULiège (19)

VDIC (19)


Resource type

book (38)


Language

English (38)


Year
From To Submit

2012 (8)

2011 (2)

2010 (2)

2009 (4)

2008 (4)

More...
Listing 1 - 10 of 38 << page
of 4
>>
Sort by

Book
Recommendation for key management. : application-specific key management guidance
Authors: ---
Year: 2008 Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for key management.
Authors: ---
Year: 2007 Publisher: [Gaithersburg, MD] : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Transitions : recommendation for transitioning the use of crytographic algorithms and key lengths
Authors: --- ---
Year: 2011 Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for random number generation using deterministic random bit generators (revised)
Authors: --- ---
Year: 2007 Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for random number generation using deterministic random bit generators
Authors: --- ---
Year: 2006 Publisher: [Gaithersburg, MD] : U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for obtaining assurances for digital signature applications
Authors: ---
Year: 2006 Publisher: [Gaithersburg, MD] : National Institute of Standards and Technology, Technology Administration,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography
Authors: --- --- ---
Year: 2006 Publisher: [Gaithersburg, Md.] : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A framework for designing cryptographic key management systems
Authors: ---
Year: 2012 Publisher: Gaithersburg, MD : U.S. Dept. of Commerce, National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Guideline for implementing cryptography in the federal government
Authors: --- --- ---
Year: 2005 Publisher: Gaithersburg, Md. : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This Second Edition of NIST Special Publication (SP) 800-21, updates and replaces the November 1999 edition of Guideline for Implementing Cryptography in the Federal Government. Many of the references and cryptographic techniques contained in the first edition of NIST SP 800-21 have been amended, rescinded, or superseded since its publication. The current publication offers new tools and techniques. NIST SP 800-21 is intended to provide a structured, yet flexible set of guidelines for selecting, specifying, employing, and evaluating cryptographic protection mechanisms in Federal information systems?and thus, makes a significant contribution toward satisfying the security requirements of the Federal Information Security Management Act (FISMA) of 2002, Public Law 107-347. The current publication also reflects the elimination of the waiver process by the Federal Information Security Management Act (FISMA) of 2002. SP 800-21 includes background information, describes the advantages of using cryptography; defines the role and use of standards and describes standards organizations that are outside the Federal government; describes the methods that are available for symmetric and asymmetric key cryptography; describes implementation issues (e.g., key management); discusses assessments, including the Cryptographic Module Validation Program (CMVP), the Common Criteria (CC), and Certification and Accreditation (C&A); and describes the process of choosing the types of cryptography to be used and selecting a cryptographic method or methods to fulfill a specific requirement.


Book
Recommendation for pair-wise key establishment schemes using discrete logarithm cryptography : (revised)
Authors: --- --- ---
Year: 2007 Publisher: [Gaithersburg, Md.] : National Institute of Standards and Technology,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 38 << page
of 4
>>
Sort by